Communication between people with disabilities and people who do not understand sign language is a growing social need and can be a tedious *** of the main functions of sign language is to communicate with each other ...
详细信息
Communication between people with disabilities and people who do not understand sign language is a growing social need and can be a tedious *** of the main functions of sign language is to communicate with each other through hand *** of hand gestures has become an important challenge for the recognition of sign *** are many existing models that can produce a good accuracy,but if the model test with rotated or translated images,they may face some difficulties to make good performance *** resolve these challenges of hand gesture recognition,we proposed a Rotation,Translation and Scale-invariant sign word recognition system using a convolu-tional neural network(CNN).We have followed three steps in our work:rotated,translated and scaled(RTS)version dataset generation,gesture segmentation,and sign word ***,we have enlarged a benchmark dataset of 20 sign words by making different amounts of Rotation,Translation and Scale of the ori-ginal images to create the RTS version *** we have applied the gesture segmentation *** segmentation consists of three levels,i)Otsu Thresholding with YCbCr,ii)Morphological analysis:dilation through opening morphology and iii)Watershed ***,our designed CNN model has been trained to classify the hand gesture as well as the sign *** model has been evaluated using the twenty sign word dataset,five sign word dataset and the RTS version of these *** achieved 99.30%accuracy from the twenty sign word dataset evaluation,99.10%accuracy from the RTS version of the twenty sign word evolution,100%accuracy from thefive sign word dataset evaluation,and 98.00%accuracy from the RTS versionfive sign word dataset ***,the influence of our model exists in competitive results with state-of-the-art methods in sign word recognition.
The skin acts as an important barrier between the body and the external environment, playing a vital role as an organ. The application of deep learning in the medical field to solve various health problems has generat...
详细信息
This paper proposes an improved You Only Look Once(YOLOv3)algorithm for automatically detecting damaged apples to promote the automation of the fruit processing *** the proposed method,a clustering method based on Rao...
详细信息
This paper proposes an improved You Only Look Once(YOLOv3)algorithm for automatically detecting damaged apples to promote the automation of the fruit processing *** the proposed method,a clustering method based on Rao-1 algorithm is introduced to optimize anchor box *** clustering method uses the intersection over the union to form the objective function and the most representative anchor boxes are generated for normal and damaged apple *** verify the feasibility and effectiveness of the proposed method,real apple images collected from the Internet are *** with the generic YOLOv3 and Fast Region-based Convolutional Neural Network(Fast R-CNN)algorithms,the proposed method yields the highest mean average precision value for the test ***,it is practical to apply the proposed method for intelligent apple detection and classification tasks.
Code search is a technique for users to retrieve code snippets from the Code base using natural language, which is dedicated to retrieve the target code accurately and quickly to improve the efficiency of software dev...
详细信息
In recent years, there has been a rapid growth of online learning in higher education. Apart from professional online course platforms, many online video sharing websites have also provided online learning opportuniti...
详细信息
Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information ***,these approaches have some *** example,a cover image lacks self-adaptability,inform...
详细信息
Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information ***,these approaches have some *** example,a cover image lacks self-adaptability,information leakage,or weak *** address these issues,this study proposes a universal and adaptable image-hiding ***,a domain attention mechanism is designed by combining the Atrous convolution,which makes better use of the relationship between the secret image domain and the cover image ***,to improve perceived human similarity,perceptual loss is incorporated into the training *** experimental results are promising,with the proposed method achieving an average pixel discrepancy(APD)of 1.83 and a peak signal-to-noise ratio(PSNR)value of 40.72 dB between the cover and stego images,indicative of its high-quality ***,the structural similarity index measure(SSIM)reaches 0.985 while the learned perceptual image patch similarity(LPIPS)remarkably registers at ***,self-testing and cross-experiments demonstrate the model’s adaptability and generalization in unknown hidden spaces,making it suitable for diverse computer vision tasks.
Network traffic classification is a critical concern in network security and management, essential for accurately differentiating among various network applications, optimizing service quality, and improving user expe...
详细信息
Network traffic classification is a critical concern in network security and management, essential for accurately differentiating among various network applications, optimizing service quality, and improving user experience. The exponential increase in worldwide Internet users and network traffic is continuously augmenting the diversity and complexity of network applications, rendering the Internet environment increasingly intricate and dynamic. Conventional machine learning techniques possess restricted processing abilities for network traffic attributes and struggle to address the progressively intricate traffic classification tasks in contemporary networks. In recent years, the swift advancement of deep learning technologies, particularly Graph Neural Networks (GNN), has yielded significant improvements in network traffic classification. GNN can capture the structured information among network nodes and extract the latent features of network traffic. Nonetheless, current network traffic classification models continue to exhibit deficiencies in the thoroughness of feature extraction. To tackle the problem, this research proposes a method for constructing traffic graphs utilizing numerical similarity and byte distance proximity by exploring the latent correlations among bytes, and it constructs a model, SDA-GNN, based on Graph Isomorphic Networks (GIN) for the categorization of network traffic. In particular, the Dynamic Time Warping (DTW) distance is employed to evaluate the disparity in byte distributions, a channel attention mechanism is utilized to extract additional features, and a Long Short-Term Memory Network (LSTM) enhances the stability of the training process by extracting sequence characteristics. Experimental findings on two actual datasets indicate that the SDA-GNN model surpasses other baseline techniques across multiple assessment parameters in the network traffic classification task, achieving classification accuracy enhancements of 2.19% and 1.49%
Network security game was usually considered as attack-defense confrontation;however, we need to think out of the box because any network entity may get a chance to launch an attack. The problem of network security wh...
详细信息
Model performance has been significantly enhanced by channel attention. The average pooling procedure creates skewness, lowering the performance of the network architecture. In the channel attention approach, average ...
详细信息
Blockchain technology has the characteristics of non-tampering and forgery, traceability, and so on, which have good application advantages for the storage of multimedia data. So we propose a novel method using matrix...
详细信息
暂无评论